Indoor security anonymous authentication method based on Internet of things technology
Technical Field
The application relates to the technical field of encryption of the Internet of things, in particular to an indoor security anonymous authentication method based on the Internet of things technology.
Background
With the rapid development of the internet of things technology, more and more devices are connected to the internet, and the devices can acquire environmental information through sensors and communicate with other devices, so that intelligent control and management are realized. In the indoor security field, the sensor can be used for detecting abnormal conditions such as invasion, fire disaster, smoke and the like, and timely sending alarm information to security departments. Currently, many indoor security systems use authentication methods based on authentication, i.e., a user must provide identity information to access a sensor or other device. However, this method has some drawbacks, for example, the identity information is easily compromised or falsified, resulting in a threat to the privacy and security of the user. In addition, the operation and maintenance personnel of the sensor and the staff of the security department also need to protect the privacy and safety of the sensor. Therefore, the data storage device should store and transmit sensor data in secret to prevent information from being leaked to an illegal user.
In order to protect the privacy of an indoor sensor and operation and maintenance personnel thereof and the privacy of security personnel, it is necessary to develop an indoor security anonymous authentication method which is safer and protects privacy. However, many schemes are not computationally efficient in anonymous authentication processes.
Therefore, to overcome these limitations, it is necessary to provide a method that overcomes the security weakness of existing schemes and provides lower computational costs in the anonymous authentication process.
Disclosure of Invention
The application aims to provide an indoor security anonymous authentication method based on the internet of things technology, which uses lower calculation cost on the basis of information security.
In order to achieve the above purpose, the present application provides the following technical solutions: an indoor security anonymous authentication method based on the internet of things technology comprises the following steps:
s1, initializing and activating a trusted authority in a server, wherein the server comprises a data receiver;
s2, the server receives personal information provided by operation staff and security staff, and the trusted authority generates identity information according to the personal information and stores the identity information in the data receiver;
s3, the operation and maintenance personnel and the security personnel carry out mutual anonymous verification through the trusted authority, if the mutual verification is legal, the data receiver encrypts the identity information, otherwise, the identity information is not encrypted.
Further, the initializing and activating the trusted authority in the server is specifically as follows: the trusted authority generates parameters, keys, and a secure encryption function.
Further, the trusted authority selects a random numberAs its master key, < >>As its private key, < >>As its public key, choose +.>As an authentication parameter, a hash function is selected:for its secure encryption function, and choose +.>As a system public parameter, wherein q represents a large prime number domain,/->Multiplication loop order representing three q-orders, +.>Are respectively->Subset of (a), i.e.)>E represents a natural constant.
Further, the personal information includes a name, a mobile phone number, an address, and an email id; the identity information includes an anonymous identity, a tracking parameter, and an identity key.
Further, the trusted authority generating the identity information for the operation and maintenance personnel specifically includes: selecting a random numberWill be gotThe private key of the operation and maintenance personnel is expressed as:The corresponding public key is denoted +.>The method comprises the steps of carrying out a first treatment on the surface of the For every operation and maintenance person->Generating an anonymous identity->The method comprises the steps of carrying out a first treatment on the surface of the For every operation and maintenance person->Generating tracking parameters:And will->,Is kept in a tracking list of the trusted authority.
Further, the trusted authority generating the identity information for the security personnel specifically includes: selecting a random numberAnd the private key of the security personnel is expressed as +.>The corresponding public key is denoted +.>The method comprises the steps of carrying out a first treatment on the surface of the For every security personnel->Generating an anonymous identity->The method comprises the steps of carrying out a first treatment on the surface of the For every security personnel->Is to generate an anonymous identity +.>The method comprises the steps of carrying out a first treatment on the surface of the For every security personnel->Generating tracking parameters:and will->,Is kept in a tracking list of the trusted authority.
Further, the security personnel anonymously verifies the operation and maintenance personnel, wherein the operation and maintenance personnel identity verification comprises the following steps of: the data receiver of the operation and maintenance personnel selects 4 random numbersAs a short-lived session key and calculate +.>Wherein:,,,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver calculates SLC:and 4 short-lived virtual parameters:,,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver sets the anonymous authentication certificate AAC to:then calculate +.>And sets an anonymous message +.>:Wherein->Representing the current timestamp.
Further, the operation and maintenance personnel anonymously verifying the security personnel comprises verifying the identity and the validity of the security personnel, wherein the verifying the identity of the security personnel specifically comprises: the security personnel check the timestampAnd makeWherein->Is the operation and maintenance personnelAnd the time delay mutually agreed by the security personnel; the security personnel calculate:,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver calculates its OSLC:And compares whether or not there isIf the security personnel exist, the security personnel accept the SLC, and if the security personnel do not exist, the security personnel reject the SLC; wherein, the correctness proves as follows:
,
,
;
if any one of the verification processes fails, the operation and maintenance personnel can be considered as illegal users;
verifying the validity of the security personnel specifically comprises the following steps: the security personnelCalculating arbitrary parametersThen, calculating:Calculating its anonymous credential:and associate it with a timestamp->Send to the operation and maintenance personnel +.>Is a data receiver of (a); the operation and maintenance personnel are->After receiving the information, the data receiver of (1) first verifies the current timestamp and then verifies if it is presentTo check the security personnel +.>The validity of which proves as:
;
the operation and maintenance personnelIs calculated by the data receiver of (1):And compares whether there is +>If so, consider the security personnel +.>Is an authenticated user, if not present, directly terminating the security personnel +.>Is to be used for subsequent communication.
Further, the encrypting the identity information by the data receiver specifically includes: the data receiver of the operation and maintenance personnel sends sensor data BI to the security personnel, and the sensor data BI is encrypted and decrypted by the data receiver by using any one of encryption algorithms based on ECC.
Further, the ECC-based encryption algorithm is an ECC elliptic curve encryption algorithm, which is ECDH or ECDSA.
Further, the method further comprises the following steps: the trusted authority may revoke the security personnel of the improper behavior.
In summary, the application has the technical effects and advantages that:
the application provides an indoor security anonymous authentication method based on the internet of things, which ensures the security of information and protects the personal privacy and identity information of a user by mutually anonymously verifying operation and maintenance personnel and security personnel, thereby avoiding the situation that the user refuses to use an indoor security system because of the security problem; meanwhile, the authentication method provided by the application improves the calculation efficiency through the technology of the Internet of things, and has low calculation cost.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of steps of an indoor security anonymous authentication method based on the internet of things technology according to an embodiment;
fig. 2 is a schematic diagram of an indoor security anonymous authentication method module based on the internet of things technology according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Examples: referring to fig. 1-2, an indoor security anonymous authentication method based on the internet of things technology comprises the following steps:
s1, initializing and activating a trusted authority in a server, wherein the server comprises a data receiver;
s2, the server receives personal information provided by operation staff and security staff, and the trusted authority generates identity information according to the personal information and stores the identity information in the data receiver;
s3, the operation and maintenance personnel and the security personnel carry out mutual anonymous verification through the trusted authority, if the mutual verification is legal, the data receiver encrypts the identity information, otherwise, the identity information is not encrypted.
In this embodiment, for step S1, the initializing and activating the trusted authority by the server specifically includes: the trusted authority generates parameters, keys, and a secure encryption function. The method specifically comprises the following steps: the trusted authority selects a random numberAs its master key, < >>As its private key, < >>As its public key, selectAs identity verification parameter, hash function is selected:For its secure encryption function, and selectAs a system public parameter, wherein q represents a large prime number domain,/->Multiplication loop order representing three q-orders, +.>Are respectively->Subset of (a), i.e.)>Wherein e represents a natural constant.
In this embodiment, personal information of the user including a name, a mobile phone number, an address, and an email id needs to be provided for registration of the user; the identity information produced accordingly by the trusted authority includes an anonymous identity, tracking parameters, and an identity key.
In particular, if the user is an operation and maintenance personThe trusted authority obtains +.>And store it in a secure manner in a database. Said trusted authority selecting a random number +.>And represents the private key as:The corresponding public key is +>. The trusted authority is +.>Generating an anonymous identity->So that the true identity of the operation and maintenance personnel is protected from unauthorized users during the communication. In the indoor security anonymous authentication method, the operation and maintenance personnel uses anonymous identity +.>To communicate, is->Mapping with the user's real credentials only in the trusted authority. Thus, anonymous identities will not provide an attacker with an operation and maintenance person +.>Is a real information of the (b). The trusted authority is for each operation and maintenance personGenerating tracking parameters:And will->,Is kept in a tracking list of the trusted authority. Then, the trusted authority will +.>Send to->,Will->Stored in the own data receiver, the trusted authority will +.>) Send to->,After receiving this information, execute->And get->。
If the user is a security personnelThe trusted authority obtains +.>And store it in a secure manner in a database. Said trusted authority selecting a random number +.>And the private key is expressed as +.>The corresponding public key is +>. The trusted authority is +.>Generating an anonymous identity->. Furthermore, the security personnel need to be those who have been registered in the book at their work, the trusted authority being +.>Is to generate an anonymous identity +.>The trusted authority can only generate this identity if the corresponding work entity is registered in the trusted authority, and the security personnel of the non-registered work entity cannot use the indoor security system. The trusted authority is +.>Generating tracking parameters:And will->And storing the information in a tracking list of the trusted authority. Furthermore, the trusted authority is +/for each security person>Two keys are selected:And (2) and. The trusted authority will +.>Send to->,Will store +.>The trusted authority will:Send to->,After receiving this information, execute->And obtain:. After the registration process is completed, the operation and maintenance personnel and the security personnel can carry out anonymous authentication.
In this embodiment, referring to fig. 2, the anonymously verifying the operation and maintenance personnel by the security personnel includes verifying the identity of the operation and maintenance personnel, specifically: the data receiver of the operation and maintenance personnel selects 4 random numbersAs a short-lived session key and calculate +.>Wherein:,,,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver calculates SLC:And 4 short-lived virtual parameters:,,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver sets the anonymous authentication certificate AAC to:Then calculate +.>And sets an anonymous message +.>:Wherein->Representing the current timestamp.
In this embodiment, the operation and maintenance personnel anonymously verifies the security personnel including verifying the identity and validity of the security personnel, where verifying the identity of the security personnel specifically includes: the security personnel check the timestampAnd makeWherein->The time delay is mutually agreed by the operation and maintenance personnel and the security personnel; the security personnel calculate:,,The method comprises the steps of carrying out a first treatment on the surface of the The data receiver calculates its OSLC:And compares whether or not there isIf the security personnel exist, the security personnel accept the SLC, and if the security personnel do not exist, the security personnel reject the SLC; wherein, the correctness proves as follows:
,
,
。
if any one of the verification processes fails, the operation and maintenance personnel can be considered as illegal users;
verifying the validity of the security personnel specifically comprises the following steps: the security personnelCalculating arbitrary parametersThen, calculating:Calculating its anonymous credential:and associate it with a timestamp->Send to the operation and maintenance personnel +.>Is a data receiver of (a); the operation and maintenance personnel are->After receiving the information, the data receiver of (1) first verifies the current timestamp and then verifies if it is presentTo check the security personnel +.>The validity of which proves as:
;
the operation and maintenance personnelIs calculated by the data receiver of (1):And compares whether there is +>If so, consider the security personnel +.>Is an authenticated user if not presentIn the mean, the security personnel are directly terminated +.>Is to be used for subsequent communication.
In this embodiment, the encrypting, by the data receiver, the identity information specifically includes: the data receiver of the operation and maintenance personnel sends sensor data BI to the security personnel, and the sensor data BI is encrypted and decrypted by the data receiver by using any one of encryption algorithms based on ECC. Wherein the ECC-based encryption algorithm is an ECC elliptic curve encryption algorithm, such as ECDH or ECDSA.
Specifically, the data receiver uses any one of the ECC-based encryption algorithms to encrypt and decrypt: the data receiver of the operation and maintenance personnel firstly obtains a random number in the encryption processAnd calculates ciphertext:wherein->When the security personnel needs to know the position information of the operation and maintenance personnel, use +.>Value of>. In the decryption process, security personnel receive C and pass through:Decryption is performed. The correctness of the test paper is proved as follows:
,
wherein,
;
。
likewise, the security personnel send their advice MA to the operation and maintenance personnel in the following encrypted manner: selecting a random numberAnd calculates ciphertext ++>Wherein:
;
security personnel receiveAnd then decrypted by the decryption process of claim 12 to obtain MA.
In this embodiment, the trusted authority may revoke security personnel with improper behavior. The method comprises the following steps: even authenticated security personnel may send incorrect advice information to the operation and maintenance personnel, thereby causing the operation and maintenance personnel to perform incorrect operations. If such improper behavior occurs, the trusted authority may revoke the misbehaving security personnel from the anonymous authentication system. The method comprises the following steps: the trusted authority decrypts the ciphertext of the corresponding security personnel by using the private key of the operation and maintenance personnel receiving the error proposal information of the security personnel. Then, the trusted authority calculates +.>And by means of its tracking list the parameter is +.>Is identified by the trusted authority as +.>After that, it is withdrawn from the anonymous authentication system, and the operation and maintenance personnel cannot associate with +.>Further communication is performed.
The application has the advantages that the application provides the indoor security anonymous authentication method based on the internet of things technology, through mutual anonymous authentication of operation and maintenance personnel and security personnel, the security of information is ensured, the personal privacy and identity information of a user are protected, and the situation that the user refuses to use an indoor security system because of security problems is avoided; meanwhile, the authentication method provided by the application improves the calculation efficiency through the technology of the Internet of things, and has low calculation cost.
Finally, it should be noted that: the foregoing description is only illustrative of the preferred embodiments of the present application, and although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described, or equivalents may be substituted for elements thereof, and any modifications, equivalents, improvements or changes may be made without departing from the spirit and principles of the present application.